Executive Summary
Summary | |
---|---|
Title | php53 security, bug fix and enhancement update |
Informations | |||
---|---|---|---|
Name | RHSA-2013:1307 | First vendor Publication | 2013-09-30 |
Vendor | RedHat | Last vendor Modification | 2013-09-30 |
Severity (Vendor) | Moderate | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: Updated php53 packages that fix multiple security issues, several bugs, and add one enhancement are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Description: PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. It was found that PHP did not properly handle file names with a NULL character. A remote attacker could possibly use this flaw to make a PHP script access unexpected files and bypass intended file system access restrictions. (CVE-2006-7243) It was found that PHP did not check for carriage returns in HTTP headers, allowing intended HTTP response splitting protections to be bypassed. Depending on the web browser the victim is using, a remote attacker could use this flaw to perform HTTP response splitting attacks. (CVE-2011-1398) A flaw was found in PHP's SSL client's hostname identity check when handling certificates that contain hostnames with NULL bytes. If an attacker was able to get a carefully crafted certificate signed by a trusted Certificate Authority, the attacker could use the certificate to conduct man-in-the-middle attacks to spoof SSL servers. (CVE-2013-4248) An integer signedness issue, leading to a heap-based buffer underflow, was found in the PHP scandir() function. If a remote attacker could upload an excessively large number of files to a directory the scandir() function runs on, it could cause the PHP interpreter to crash or, possibly, execute arbitrary code. (CVE-2012-2688) It was found that PHP did not correctly handle the magic_quotes_gpc configuration directive. This could result in magic_quotes_gpc input escaping not being applied in all cases, possibly making it easier for a remote attacker to perform SQL injection attacks. (CVE-2012-0831) It was found that the PHP SOAP parser allowed the expansion of external XML entities during SOAP message parsing. A remote attacker could possibly use this flaw to read arbitrary files that are accessible to a PHP application using a SOAP extension. (CVE-2013-1643) These updated php53 packages also include numerous bug fixes and enhancements. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Enterprise Linux 5.10 Technical Notes, linked to in the References, for information on the most significant of these changes. All PHP users are advised to upgrade to these updated packages, which contain backported patches to correct these issues and add this enhancement. After installing the updated packages, the httpd daemon must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 662707 - CVE-2006-7243 php: paths with NULL character were considered valid 789468 - CVE-2012-0831 php: PG(magic_quote_gpc) was not restored on shutdown 828051 - CVE-2012-2688 php: Integer Signedness issues in _php_stream_scandir 837044 - add php(language) virtual provide 853329 - CVE-2011-1398 PHP: sapi_header_op() %0D sequence handling security bypass 869691 - setDate, setISODate, setTime works wrong when DateTime created from timestamp 869693 - PDOStatement execute segfaults for pdo_mysql driver 869697 - fileinfo extension: use stat function from stream wrapper 892695 - $this becomes a non-object 918187 - CVE-2013-1643 php: Ability to read arbitrary files due use of external entities while parsing SOAP WSDL files 951075 - Apache 2.2.15 on RHEL 6.3 segfaults with certain PHP content 953818 - Bad memset call in libzip 997097 - CVE-2013-4248 php: hostname check bypassing vulnerability in SSL client |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2013-1307.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
80 % | CWE-20 | Improper Input Validation |
20 % | CWE-200 | Information Exposure |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:12569 | |||
Oval ID: | oval:org.mitre.oval:def:12569 | ||
Title: | NULL byte injection vulnerability in PHP before 5.3.4 | ||
Description: | PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-7243 | Version: | 3 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Vista Microsoft Windows XP | Product(s): | PHP |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:18102 | |||
Oval ID: | oval:org.mitre.oval:def:18102 | ||
Title: | USN-1761-1 -- php5 vulnerability | ||
Description: | PHP could be made to expose sensitive information over the network. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1761-1 CVE-2013-1643 | Version: | 7 |
Platform(s): | Ubuntu 12.10 Ubuntu 12.04 Ubuntu 11.10 Ubuntu 10.04 Ubuntu 8.04 | Product(s): | php5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18157 | |||
Oval ID: | oval:org.mitre.oval:def:18157 | ||
Title: | DSA-2639-1 php5 - several vulnerabilities | ||
Description: | Several vulnerabilities have been discovered in PHP, the web scripting language. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2639-1 CVE-2013-1635 CVE-2013-1643 | Version: | 7 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | php5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18760 | |||
Oval ID: | oval:org.mitre.oval:def:18760 | ||
Title: | DSA-2742-1 php5 - interpretation conflict | ||
Description: | It was discovered that PHP, a general-purpose scripting language commonly used for web application development, did not properly process embedded NUL characters in the subjectAltName extension of X.509 certificates. Depending on the application and with insufficient CA-level checks, this could be abused for impersonating other users. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2742-1 CVE-2013-4248 | Version: | 8 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/Linux 7 Debian GNU/kFreeBSD 6.0 Debian GNU/kFreeBSD 7 | Product(s): | php5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18927 | |||
Oval ID: | oval:org.mitre.oval:def:18927 | ||
Title: | USN-1937-1 -- php5 vulnerability | ||
Description: | Fraudulent security certificates could allow sensitive information to be exposed when accessing the Internet. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1937-1 CVE-2013-4248 | Version: | 7 |
Platform(s): | Ubuntu 13.04 Ubuntu 12.10 Ubuntu 12.04 Ubuntu 10.04 | Product(s): | php5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19494 | |||
Oval ID: | oval:org.mitre.oval:def:19494 | ||
Title: | HP-UX Apache Running Tomcat Servlet Engine, Remote Denial of Service (DoS), Access Restriction Bypass | ||
Description: | PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2006-7243 | Version: | 10 |
Platform(s): | HP-UX 11 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27044 | |||
Oval ID: | oval:org.mitre.oval:def:27044 | ||
Title: | RHSA-2013:1615 -- php security, bug fix, and enhancement update (Moderate) | ||
Description: | PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. It was found that PHP did not properly handle file names with a NULL character. A remote attacker could possibly use this flaw to make a PHP script access unexpected files and bypass intended file system access restrictions. (CVE-2006-7243) A flaw was found in PHP's SSL client's hostname identity check when handling certificates that contain hostnames with NULL bytes. If an attacker was able to get a carefully crafted certificate signed by a trusted Certificate Authority, the attacker could use the certificate to conduct man-in-the-middle attacks to spoof SSL servers. (CVE-2013-4248) It was found that the PHP SOAP parser allowed the expansion of external XML entities during SOAP message parsing. A remote attacker could possibly use this flaw to read arbitrary files that are accessible to a PHP application using a SOAP extension. (CVE-2013-1643) This update fixes the following bugs: * Previously, when the allow_call_time_pass_reference setting was disabled, a virtual host on the Apache server could terminate with a segmentation fault when attempting to process certain PHP content. This bug has been fixed and virtual hosts no longer crash when allow_call_time_pass_reference is off. (BZ#892158, BZ#910466) * Prior to this update, if an error occurred during the operation of the fclose(), file_put_contents(), or copy() function, the function did not report it. This could have led to data loss. With this update, the aforementioned functions have been modified to properly report any errors. (BZ#947429) * The internal buffer for the SQLSTATE error code can store maximum of 5 characters. Previously, when certain calls exceeded this limit, a buffer overflow occurred. With this update, messages longer than 5 characters are automatically replaced with the default "HY000" string, thus preventing the overflow. (BZ#969110) In addition, this update adds the following enhancement: * This update adds the following rpm macros to the php package: %__php, %php_inidir, %php_incldir. (BZ#953814) Users of php are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing the updated packages, the httpd daemon must be restarted for the update to take effect. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2013:1615 CESA-2013:1615 CVE-2006-7243 CVE-2013-1643 CVE-2013-4248 | Version: | 3 |
Platform(s): | Red Hat Enterprise Linux 6 CentOS Linux 6 | Product(s): | php |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-12-13 | Name : SuSE Update for update openSUSE-SU-2012:0426-1 (update) File : nvt/gb_suse_2012_0426_1.nasl |
2012-09-26 | Name : Gentoo Security Advisory GLSA 201209-03 (php) File : nvt/glsa_201209_03.nasl |
2012-09-25 | Name : Mac OS X v10.6.8 Multiple Vulnerabilities (2012-004) File : nvt/gb_macosx_su12-004.nasl |
2012-09-24 | Name : PHP 'main/SAPI.c' HTTP Header Injection Vulnerability File : nvt/gb_php_http_header_injection_vuln_win.nasl |
2012-09-22 | Name : Ubuntu Update for php5 USN-1569-1 File : nvt/gb_ubuntu_USN_1569_1.nasl |
2012-09-10 | Name : Slackware Advisory SSA:2012-204-01 php File : nvt/esoft_slk_ssa_2012_204_01.nasl |
2012-09-07 | Name : FreeBSD Ports: php5 File : nvt/freebsd_php519.nasl |
2012-08-30 | Name : Debian Security Advisory DSA 2527-1 (php5) File : nvt/deb_2527_1.nasl |
2012-08-30 | Name : Fedora Update for php FEDORA-2012-10936 File : nvt/gb_fedora_2012_10936_php_fc17.nasl |
2012-08-30 | Name : Fedora Update for maniadrive FEDORA-2012-10936 File : nvt/gb_fedora_2012_10936_maniadrive_fc17.nasl |
2012-08-10 | Name : FreeBSD Ports: php5 File : nvt/freebsd_php518.nasl |
2012-08-06 | Name : Fedora Update for php FEDORA-2012-10908 File : nvt/gb_fedora_2012_10908_php_fc16.nasl |
2012-08-06 | Name : Fedora Update for maniadrive FEDORA-2012-10908 File : nvt/gb_fedora_2012_10908_maniadrive_fc16.nasl |
2012-08-06 | Name : Fedora Update for php-eaccelerator FEDORA-2012-10908 File : nvt/gb_fedora_2012_10908_php-eaccelerator_fc16.nasl |
2012-08-03 | Name : Mandriva Update for php MDVSA-2012:065 (php) File : nvt/gb_mandriva_MDVSA_2012_065.nasl |
2012-07-26 | Name : Mandriva Update for php MDVSA-2012:108 (php) File : nvt/gb_mandriva_MDVSA_2012_108.nasl |
2012-06-21 | Name : PHP version smaller than 5.3.4 File : nvt/nopsec_php_5_3_4.nasl |
2012-05-08 | Name : Fedora Update for php FEDORA-2012-6911 File : nvt/gb_fedora_2012_6911_php_fc15.nasl |
2012-05-08 | Name : Fedora Update for php FEDORA-2012-6907 File : nvt/gb_fedora_2012_6907_php_fc16.nasl |
2012-05-08 | Name : Fedora Update for php-eaccelerator FEDORA-2012-6911 File : nvt/gb_fedora_2012_6911_php-eaccelerator_fc15.nasl |
2012-05-08 | Name : Fedora Update for maniadrive FEDORA-2012-6911 File : nvt/gb_fedora_2012_6911_maniadrive_fc15.nasl |
2012-05-08 | Name : Fedora Update for php-eaccelerator FEDORA-2012-6907 File : nvt/gb_fedora_2012_6907_php-eaccelerator_fc16.nasl |
2012-05-08 | Name : Fedora Update for maniadrive FEDORA-2012-6907 File : nvt/gb_fedora_2012_6907_maniadrive_fc16.nasl |
2012-04-30 | Name : FreeBSD Ports: php File : nvt/freebsd_php.nasl |
2012-03-12 | Name : Debian Security Advisory DSA 2408-1 (php5) File : nvt/deb_2408_1.nasl |
2012-02-21 | Name : Ubuntu Update for php5 USN-1358-2 File : nvt/gb_ubuntu_USN_1358_2.nasl |
2012-02-13 | Name : Ubuntu Update for php5 USN-1358-1 File : nvt/gb_ubuntu_USN_1358_1.nasl |
2012-02-12 | Name : Gentoo Security Advisory GLSA 201110-06 (php) File : nvt/glsa_201110_06.nasl |
2012-02-10 | Name : PHP 'magic_quotes_gpc' Directive Security Bypass Vulnerability (Windows) File : nvt/gb_php_magic_quotes_gpc_sec_bypass_vuln_win.nasl |
2011-08-26 | Name : Mac OS X v10.6.6 Multiple Vulnerabilities (2011-001) File : nvt/secpod_macosx_su11-001.nasl |
2011-05-10 | Name : Ubuntu Update for php5 USN-1126-1 File : nvt/gb_ubuntu_USN_1126_1.nasl |
2011-05-10 | Name : Ubuntu Update for php5 USN-1126-2 File : nvt/gb_ubuntu_USN_1126_2.nasl |
2011-02-01 | Name : PHP Multiple Security Bypass Vulnerabilities File : nvt/gb_php_mult_sec_bypass_vuln.nasl |
2011-01-24 | Name : FreeBSD Ports: php5 File : nvt/freebsd_php59.nasl |
2011-01-24 | Name : FreeBSD Ports: php5 File : nvt/freebsd_php57.nasl |
2011-01-11 | Name : Fedora Update for php-eaccelerator FEDORA-2010-18976 File : nvt/gb_fedora_2010_18976_php-eaccelerator_fc14.nasl |
2011-01-11 | Name : Fedora Update for maniadrive FEDORA-2010-18976 File : nvt/gb_fedora_2010_18976_maniadrive_fc14.nasl |
2011-01-11 | Name : Fedora Update for php FEDORA-2010-18976 File : nvt/gb_fedora_2010_18976_php_fc14.nasl |
2011-01-11 | Name : Fedora Update for maniadrive FEDORA-2010-19011 File : nvt/gb_fedora_2010_19011_maniadrive_fc13.nasl |
2011-01-11 | Name : Fedora Update for php-eaccelerator FEDORA-2010-19011 File : nvt/gb_fedora_2010_19011_php-eaccelerator_fc13.nasl |
2011-01-11 | Name : Fedora Update for php FEDORA-2010-19011 File : nvt/gb_fedora_2010_19011_php_fc13.nasl |
2010-12-28 | Name : Mandriva Update for php MDVSA-2010:254 (php) File : nvt/gb_mandriva_MDVSA_2010_254.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
70606 | PHP Pathname \0 Character file_exists Function Access Restriction Bypass PHP contains a flaw related to the accepting of the \0 character in a pathname. This may allow a context-dependent attacker to bypass access restrictions by combining this character with a safe file extension, such as .php\0.jpg. |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2014-02-27 | IAVM : 2014-A-0030 - Apple Mac OS X Security Update 2014-001 Severity : Category I - VMSKEY : V0044547 |
2013-09-19 | IAVM : 2013-A-0179 - Apple Mac OS X Security Update 2013-004 Severity : Category I - VMSKEY : V0040373 |
2013-08-22 | IAVM : 2013-B-0093 - Multiple Vulnerabilities in PHP Severity : Category I - VMSKEY : V0040108 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2016-08-29 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2016-1638-1.nasl - Type : ACT_GATHER_INFO |
2016-03-01 | Name : The remote Debian host is missing a security update. File : debian_DLA-444.nasl - Type : ACT_GATHER_INFO |
2016-01-22 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL16993.nasl - Type : ACT_GATHER_INFO |
2015-09-08 | Name : The remote Debian host is missing a security update. File : debian_DLA-307.nasl - Type : ACT_GATHER_INFO |
2015-08-20 | Name : The remote application is affected by multiple vulnerabilities. File : securitycenter_php_5_4_41.nasl - Type : ACT_GATHER_INFO |
2015-06-12 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2015-162-02.nasl - Type : ACT_GATHER_INFO |
2015-05-29 | Name : The remote Fedora host is missing a security update. File : fedora_2015-8370.nasl - Type : ACT_GATHER_INFO |
2015-05-29 | Name : The remote Fedora host is missing a security update. File : fedora_2015-8383.nasl - Type : ACT_GATHER_INFO |
2015-05-27 | Name : The remote Fedora host is missing a security update. File : fedora_2015-8281.nasl - Type : ACT_GATHER_INFO |
2015-05-26 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_31de2e1300d211e5a072d050996490d0.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2012-1210-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-0064-1.nasl - Type : ACT_GATHER_INFO |
2015-05-18 | Name : The remote web server uses a version of PHP that is affected by multiple vuln... File : php_5_4_41.nasl - Type : ACT_GATHER_INFO |
2015-05-18 | Name : The remote web server uses a version of PHP that is affected by multiple vuln... File : php_5_5_25.nasl - Type : ACT_GATHER_INFO |
2015-05-18 | Name : The remote web server uses a version of PHP that is affected by multiple vuln... File : php_5_6_9.nasl - Type : ACT_GATHER_INFO |
2015-01-19 | Name : The remote Solaris system is missing a security patch for third-party software. File : solaris11_php_20140401.nasl - Type : ACT_GATHER_INFO |
2015-01-19 | Name : The remote Solaris system is missing a security patch for third-party software. File : solaris11_php_20140522.nasl - Type : ACT_GATHER_INFO |
2014-11-12 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-1307.nasl - Type : ACT_GATHER_INFO |
2014-11-12 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-1615.nasl - Type : ACT_GATHER_INFO |
2014-10-10 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL13519.nasl - Type : ACT_GATHER_INFO |
2014-08-30 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201408-11.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-182.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-502.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-602.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-1032.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-604.nasl - Type : ACT_GATHER_INFO |
2014-03-20 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20140318_php_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2014-03-19 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-0311.nasl - Type : ACT_GATHER_INFO |
2014-03-19 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-0311.nasl - Type : ACT_GATHER_INFO |
2014-03-19 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0311.nasl - Type : ACT_GATHER_INFO |
2014-02-25 | Name : The remote host is missing a Mac OS X update that fixes a certificate validat... File : macosx_10_9_2.nasl - Type : ACT_GATHER_INFO |
2014-02-25 | Name : The remote host is missing a Mac OS X update that fixes multiple security vul... File : macosx_SecUpd2014-001.nasl - Type : ACT_GATHER_INFO |
2014-01-22 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2014-014.nasl - Type : ACT_GATHER_INFO |
2014-01-15 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_apache2-mod_php5-131220.nasl - Type : ACT_GATHER_INFO |
2014-01-15 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_apache2-mod_php53-131218.nasl - Type : ACT_GATHER_INFO |
2013-12-12 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-1814.nasl - Type : ACT_GATHER_INFO |
2013-12-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-1814.nasl - Type : ACT_GATHER_INFO |
2013-12-12 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20131211_php_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2013-12-11 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1814.nasl - Type : ACT_GATHER_INFO |
2013-12-04 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20131121_php_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2013-11-27 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-1615.nasl - Type : ACT_GATHER_INFO |
2013-11-21 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1615.nasl - Type : ACT_GATHER_INFO |
2013-10-11 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130930_php53_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2013-10-03 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-1307.nasl - Type : ACT_GATHER_INFO |
2013-10-01 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2013-224.nasl - Type : ACT_GATHER_INFO |
2013-10-01 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1307.nasl - Type : ACT_GATHER_INFO |
2013-09-13 | Name : The remote host is missing a Mac OS X update that fixes several security issues. File : macosx_10_8_5.nasl - Type : ACT_GATHER_INFO |
2013-09-13 | Name : The remote host is missing a Mac OS X update that fixes several security issues. File : macosx_SecUpd2013-004.nasl - Type : ACT_GATHER_INFO |
2013-09-09 | Name : The remote Fedora host is missing a security update. File : fedora_2013-14985.nasl - Type : ACT_GATHER_INFO |
2013-09-06 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1937-1.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2012-116.nasl - Type : ACT_GATHER_INFO |
2013-09-02 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2013-242-02.nasl - Type : ACT_GATHER_INFO |
2013-08-28 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-221.nasl - Type : ACT_GATHER_INFO |
2013-08-27 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2742.nasl - Type : ACT_GATHER_INFO |
2013-08-25 | Name : The remote Fedora host is missing a security update. File : fedora_2013-14998.nasl - Type : ACT_GATHER_INFO |
2013-08-21 | Name : The remote web server uses a version of PHP that is potentially affected by m... File : php_5_4_18.nasl - Type : ACT_GATHER_INFO |
2013-08-21 | Name : The remote web server uses a version of PHP that is potentially affected by m... File : php_5_5_2.nasl - Type : ACT_GATHER_INFO |
2013-08-10 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_apache2-mod_php5-130718.nasl - Type : ACT_GATHER_INFO |
2013-08-10 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_apache2-mod_php53-130717.nasl - Type : ACT_GATHER_INFO |
2013-08-10 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_apache2-mod_php53-130718.nasl - Type : ACT_GATHER_INFO |
2013-08-01 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_apache2-mod_php5-8647.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-0514.nasl - Type : ACT_GATHER_INFO |
2013-05-24 | Name : The remote web server uses a version of PHP that is potentially affected by a... File : php_5_3_23.nasl - Type : ACT_GATHER_INFO |
2013-05-24 | Name : The remote web server uses a version of PHP that is potentially affected by a... File : php_5_4_13.nasl - Type : ACT_GATHER_INFO |
2013-04-20 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-114.nasl - Type : ACT_GATHER_INFO |
2013-04-03 | Name : The remote Fedora host is missing a security update. File : fedora_2013-3891.nasl - Type : ACT_GATHER_INFO |
2013-04-03 | Name : The remote Fedora host is missing a security update. File : fedora_2013-3927.nasl - Type : ACT_GATHER_INFO |
2013-03-24 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2013-081-01.nasl - Type : ACT_GATHER_INFO |
2013-03-20 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_1d23109a900511e29602d43d7e0c7c02.nasl - Type : ACT_GATHER_INFO |
2013-03-14 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1761-1.nasl - Type : ACT_GATHER_INFO |
2013-03-10 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-0514.nasl - Type : ACT_GATHER_INFO |
2013-03-06 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2639.nasl - Type : ACT_GATHER_INFO |
2013-03-04 | Name : The remote web server uses a version of PHP that is potentially affected by m... File : php_5_3_22.nasl - Type : ACT_GATHER_INFO |
2013-03-04 | Name : The remote web server uses a version of PHP that is potentially affected by m... File : php_5_4_12.nasl - Type : ACT_GATHER_INFO |
2013-03-01 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-016.nasl - Type : ACT_GATHER_INFO |
2013-03-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130221_php_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2013-02-21 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0514.nasl - Type : ACT_GATHER_INFO |
2013-01-25 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_apache2-mod_php5-120802.nasl - Type : ACT_GATHER_INFO |
2013-01-25 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_apache2-mod_php5-120905.nasl - Type : ACT_GATHER_INFO |
2013-01-25 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_apache2-mod_php53-120802.nasl - Type : ACT_GATHER_INFO |
2013-01-25 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_apache2-mod_php53-120803.nasl - Type : ACT_GATHER_INFO |
2013-01-25 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_apache2-mod_php53-120905.nasl - Type : ACT_GATHER_INFO |
2012-09-24 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201209-03.nasl - Type : ACT_GATHER_INFO |
2012-09-20 | Name : The remote host is missing a Mac OS X update that fixes multiple security vul... File : macosx_10_7_5.nasl - Type : ACT_GATHER_INFO |
2012-09-20 | Name : The remote host is missing a Mac OS X update that fixes several security issues. File : macosx_10_8_2.nasl - Type : ACT_GATHER_INFO |
2012-09-20 | Name : The remote host is missing a Mac OS X update that fixes multiple security vul... File : macosx_SecUpd2012-004.nasl - Type : ACT_GATHER_INFO |
2012-09-19 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_apache2-mod_php5-8293.nasl - Type : ACT_GATHER_INFO |
2012-09-18 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1569-1.nasl - Type : ACT_GATHER_INFO |
2012-09-06 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2012-108.nasl - Type : ACT_GATHER_INFO |
2012-09-05 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_918f38cdf71e11e18bd80022156e8794.nasl - Type : ACT_GATHER_INFO |
2012-08-24 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_apache2-mod_php5-8239.nasl - Type : ACT_GATHER_INFO |
2012-08-14 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2527.nasl - Type : ACT_GATHER_INFO |
2012-08-06 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2012-10908.nasl - Type : ACT_GATHER_INFO |
2012-08-06 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2012-10936.nasl - Type : ACT_GATHER_INFO |
2012-07-24 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_bdab0acdd4cd11e18a1c14dae9ebcf89.nasl - Type : ACT_GATHER_INFO |
2012-07-23 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2012-204-01.nasl - Type : ACT_GATHER_INFO |
2012-07-20 | Name : The remote web server uses a version of PHP that is affected by multiple vuln... File : php_5_3_15.nasl - Type : ACT_GATHER_INFO |
2012-07-20 | Name : The remote web server uses a version of PHP that is affected by an overflow v... File : php_5_4_5.nasl - Type : ACT_GATHER_INFO |
2012-05-07 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2012-6907.nasl - Type : ACT_GATHER_INFO |
2012-05-07 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2012-6911.nasl - Type : ACT_GATHER_INFO |
2012-05-02 | Name : The remote web server uses a version of PHP that is affected by multiple vuln... File : php_5_3_11.nasl - Type : ACT_GATHER_INFO |
2012-05-01 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_2cde1892913e11e1b44c001fd0af1a4c.nasl - Type : ACT_GATHER_INFO |
2012-04-27 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2012-065.nasl - Type : ACT_GATHER_INFO |
2012-04-13 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_apache2-mod_php5-120309.nasl - Type : ACT_GATHER_INFO |
2012-03-26 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_apache2-mod_php5-8009.nasl - Type : ACT_GATHER_INFO |
2012-02-14 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2408.nasl - Type : ACT_GATHER_INFO |
2012-02-14 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1358-2.nasl - Type : ACT_GATHER_INFO |
2012-02-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1358-1.nasl - Type : ACT_GATHER_INFO |
2011-10-12 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201110-06.nasl - Type : ACT_GATHER_INFO |
2011-06-13 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1126-1.nasl - Type : ACT_GATHER_INFO |
2011-06-13 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1126-2.nasl - Type : ACT_GATHER_INFO |
2011-03-22 | Name : The remote host is missing a Mac OS X update that fixes several security issues. File : macosx_10_6_7.nasl - Type : ACT_GATHER_INFO |
2011-01-13 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_3761df020f9c11e0becc0022156e8794.nasl - Type : ACT_GATHER_INFO |
2011-01-05 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2010-18976.nasl - Type : ACT_GATHER_INFO |
2011-01-05 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2010-19011.nasl - Type : ACT_GATHER_INFO |
2010-12-16 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2010-254.nasl - Type : ACT_GATHER_INFO |
2010-12-13 | Name : The remote web server uses a version of PHP that is affected by multiple flaws. File : php_5_3_4.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-11-13 13:27:17 |
|
2014-02-17 11:57:27 |
|
2013-10-01 05:19:09 |
|